2016 12th International Conference on Innovations in Information Technology (IIT)最新文献

筛选
英文 中文
From the Internet of Things to the web of things — enabling by sensing as-a service 从物联网到物联网——通过感知即服务实现
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880055
S. Mathew, Yacine Atif, M. Barachi
{"title":"From the Internet of Things to the web of things — enabling by sensing as-a service","authors":"S. Mathew, Yacine Atif, M. Barachi","doi":"10.1109/INNOVATIONS.2016.7880055","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880055","url":null,"abstract":"Sensing as a Service (SenaaS) is emerging as a prominent element in the middleware linking together the Internet of Things (IoT) and the Web of Things (WoT) layers of future ubiquitous systems. An architecture framework is discussed in this paper whereby things are abstracted into services via embedded sensors which expose a thing as a service. The architecture acts as a blueprint to guide software architects realizing WoT applications. Web-enabled things are eventually appended into Web platforms such as Social Web platforms to drive data and services that are exposed by these things to interact with both other things and people, in order to materialize further the future social Web of Things. Research directions are discussed to illustrate the integration of SenaaS into the proposed WoT architectural framework.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128143004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Overview of fingerprinting methods for local text reuse detection 本地文本重用检测的指纹方法概述
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880050
Leena Lulu, B. Belkhouche, S. Harous
{"title":"Overview of fingerprinting methods for local text reuse detection","authors":"Leena Lulu, B. Belkhouche, S. Harous","doi":"10.1109/INNOVATIONS.2016.7880050","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880050","url":null,"abstract":"We overview several local text reuse detection methods based on fingerprinting techniques. We first define the context of local text reuse and situate it within the general spectrum of information retrieval in order to pinpoint its particular applicability and challenges. After a brief description of the major text reuse detection approaches, we introduce the general principles of fingerprinting algorithms from an information retrieval perspective. Three classes of fingerprinting methods (overlap, non-overlap, and randomized) are surveyed. Specific algorithms, such as k-gram, winnowing, hailstorm, DCT and hash-breaking, are described. The performance and characteristics of these algorithms are summarized based on data from the literature.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125865516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A reconfigurable cylindrical dielectric resonator antenna for WiMAX/WLAN applications 用于WiMAX/WLAN应用的可重构圆柱形介电谐振器天线
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880018
Massinissa Belazzoug, Salih Aidel, I. Messaoudene, B. Hammache, Farouk Chetouah, Youcef Braham Chaouche
{"title":"A reconfigurable cylindrical dielectric resonator antenna for WiMAX/WLAN applications","authors":"Massinissa Belazzoug, Salih Aidel, I. Messaoudene, B. Hammache, Farouk Chetouah, Youcef Braham Chaouche","doi":"10.1109/INNOVATIONS.2016.7880018","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880018","url":null,"abstract":"The main objective of the present study is to achieve the reconfigurability of a cylindrical dielectric resonator antenna (CDRA). The CDRA is excited with two different modes; the HEMjjg mode is excited via an aperture etched on the ground under the center of the CDRA, where the TM01δ mode is excited from an etched slot under the side of the CDRA, the reconflgurabilty is realized using two PIN diodes. Two different cases of PIN diode (D1-ON/D2-OFF and vice versa) are investigated and analyzed. The proposed cylindrical dielectric resonator antenna (CDRA) can provides two bands around 3.77 GHz and 5.5 GHz with a reflection coefficient below than −10dB which is appropriate for WiMAX and WLAN applications, respectively. The antenna gain is stable in the two bands 3.77GHz/5.5GHz with 3.8 dBi and 4.43dBi, respectively. The simulation is performed using two simulators; the CST Microwave Studio and the HFSS Ansoft package.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132795671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Capstone project on speech morphing: A highlight to undergraduate education on signal processing 语音变形的顶点项目:信号处理本科教育的一个亮点
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880024
L. Weruaga, Abdulqader Mahmoud, R. Shubair
{"title":"Capstone project on speech morphing: A highlight to undergraduate education on signal processing","authors":"L. Weruaga, Abdulqader Mahmoud, R. Shubair","doi":"10.1109/INNOVATIONS.2016.7880024","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880024","url":null,"abstract":"Signal processing is a core discipline in electrical and computer engineering (ECE). The mathematical language adopted in the classroom and the laboratory support, usually limited to verification, pose the risk of hiding the enormous practical connotations of the discipline. This paper suggests to strengthen the bridge between theory and practice by means of selected capstone projects, designed according to constructivist principles. The project detailed in this paper tackles a large number of fundamental aspects of the discipline through a storyline that captivates the student during its execution.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123354852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Semantic enterprise service bus for cultural heritage 面向文化遗产的语义企业服务总线
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880044
A. Capodieci, L. Mainetti, S. Carrozzo
{"title":"Semantic enterprise service bus for cultural heritage","authors":"A. Capodieci, L. Mainetti, S. Carrozzo","doi":"10.1109/INNOVATIONS.2016.7880044","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880044","url":null,"abstract":"The problem of data flooding is becoming more and more important, and it is necessary to find a way to access relevant information and to collect information and data from different data sources. In the field of cultural heritage, users need to be able to find and extract information from databases of specific contexts (paintings, inscriptions, churches, old coins, etc.). The problem is that each of these databases has a different data model. A project created to solve this problem is Europeana, which aims to bring together data from different providers (museums, libraries or other entities) in a single dataset. This paper aims to propose an architecture for a heterogeneous data sources system for the integration of structured/semi-structured data sources, enabling the information content to be more accessible and searchable for users. The data integration model proposed in this paper aims to exploit the method of \"schema matching\", using ontology-based data integration techniques by automating the integration process.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121520067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IEFP: An application layer protocol for Islamic electronic fatawa management and security IEFP:用于伊斯兰电子法令管理和安全的应用层协议
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880037
E. Taqieddin, Yarub A. Wahsheh
{"title":"IEFP: An application layer protocol for Islamic electronic fatawa management and security","authors":"E. Taqieddin, Yarub A. Wahsheh","doi":"10.1109/INNOVATIONS.2016.7880037","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880037","url":null,"abstract":"With the unfortunate increase of terrorist attacks and the attempts to tarnish the real image of Islam, irresponsible Islamic legal decisions (Fatwas) are used to mislead some Muslims and Non-Muslims to make incorrect conclusions. The widespread of communication technologies opens a huge challenge of E-Fatawa management. In this study, we present a novel application layer protocol for electronic Fatwas to meet the need for management rules to prevent irresponsible Fatwas. We propose a global structure for E-Fatawa with security services that guarantee, Mufti authentication, data integrity and non-repudiation. A proof of concept implementation shows that the protocol is easy to implement, feasible in terms of delay and key management, and protocol messages are flexible to be encoded in other application layer protocols.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129104218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure kNN queries over outsourced spatial data for location-based services 基于位置服务的外包空间数据的安全kNN查询
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880038
Ayesha M. Talha, I. Kamel, Z. Aghbari
{"title":"Secure kNN queries over outsourced spatial data for location-based services","authors":"Ayesha M. Talha, I. Kamel, Z. Aghbari","doi":"10.1109/INNOVATIONS.2016.7880038","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880038","url":null,"abstract":"Cloud computing allows data owners to outsource their databases, eliminating the need for costly storage and computational resources. The key is to maintain data confidentiality with respect to third-party service providers along with providing query results in real-time to authorized users. In this paper, a transformation and encryption approach is proposed for spatial databases, where the service provider executes queries and returns results to the users. First, the approach uses the space-filling Hilbert curve to map each spatial point in the multidimensional space to a one-dimensional space. Next, the order-preserving encryption technique is applied to the transformed spatial data. The user issues spatial kNN queries to the service provider based on the Hilbert values and then uses the encryption key to decrypt the query response returned. Experiments are conducted to show that this approach reduces the query communication cost between the authorized user and the service provider.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130748673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A framework for building undergraduate student research skills through an independent engineering study course 通过独立的工程学习课程培养本科生研究技能的框架
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880026
R. Shubair, Hadeel Elayan, M. AlHajri, A. Goian
{"title":"A framework for building undergraduate student research skills through an independent engineering study course","authors":"R. Shubair, Hadeel Elayan, M. AlHajri, A. Goian","doi":"10.1109/INNOVATIONS.2016.7880026","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880026","url":null,"abstract":"This paper presents a framework for the undergraduate research experience that Electrical and Computer Engineering (ECE) Senior Undergraduate students at Khalifa University, UAE pursue through a fourth-year technical elective course entitled Independent Study that is one-semester long. This course is an excellent example of self-directed learning as one of the most influential educational experiences that students might get involved in. Through this Independent Study course, the student has the opportunity to work individually and independently on an engineering research project, at an undergraduate level, under the supervision of an ECE faculty member. The faculty member acts as the research project academic supervisor. He provides guidance, gives technical advice, helps in setting milestone, defines a road-map, agrees on deliverables, verifies the objectives are met and outcomes are achieved, and finally evaluates the student performance upon the completion of the Independent Study project, by the end of the semester. The successful delivery of the Independent Engineering Study course at the undergraduate level is demonstrated through two real case studies, which involved state-of-the-art research on two prominent topics: \"In Vivo Wireless Body Communication\" and \"Novel Localization Methods in Wireless Sensor Networks\".","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131762693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Facial features monitoring for real time drowsiness detection 面部特征监测实时睡意检测
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880030
B. Manu
{"title":"Facial features monitoring for real time drowsiness detection","authors":"B. Manu","doi":"10.1109/INNOVATIONS.2016.7880030","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880030","url":null,"abstract":"This paper describes an efficient method for drowsiness detection by three well defined phases. These three phases are facial features detection using Viola Jones, the eye tracking and yawning detection. Once the face is detected, the system is made illumination invariant by segmenting the skin part alone and considering only the chromatic components to reject most of the non face image backgrounds based on skin color. The tracking of eyes and yawning detection are done by correlation coefficient template matching. The feature vectors from each of the above phases are concatenated and a binary linear support vector machine classifier is used to classify the consecutive frames into fatigue and nonfatigue states and sound an alarm for the former, if it is above the threshold time. Extensive real time experiments prove that the proposed method is highly efficient in finding the drowsiness and alerting the driver.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"19 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127092341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
New model of emergency communication for disaster relief in remote areas 偏远地区救灾应急通信新模式
2016 12th International Conference on Innovations in Information Technology (IIT) Pub Date : 2016-11-01 DOI: 10.1109/INNOVATIONS.2016.7880019
A. E. Aburawi, S. Salic, M. Krampell
{"title":"New model of emergency communication for disaster relief in remote areas","authors":"A. E. Aburawi, S. Salic, M. Krampell","doi":"10.1109/INNOVATIONS.2016.7880019","DOIUrl":"https://doi.org/10.1109/INNOVATIONS.2016.7880019","url":null,"abstract":"Even in the 21st century, modern communication technology is still affected by natural disasters and political turmoil which threaten people's lives and make the Internet or mobile phone networks unavailable for use. This work is based on constructive research which resulted in a proof of concept system that uses shortwave radio technology to provide a oneway communication system. A message that a user writes on their smartphone, which is connected to a small preset transmitter, is sent out to a receiver in another part of the world where the message can then be posted on the Internet. This system is a cheaper alternative to other shortwave radio transmitters, and has potential for improvement.","PeriodicalId":412653,"journal":{"name":"2016 12th International Conference on Innovations in Information Technology (IIT)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124371731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信